About your Search

20130416
20130424
Search Results 0 to 11 of about 12 (some duplicates have been removed)
attribute the not be all of its radars and sensors and missiles and stealth technology and the ability to fight at supersonic speeds. it may well be the way it has been designed to evade budget cutters in washington. >> what is the difference between e f-35 and the f-22? 22 has had its share of technical troubles. the was supposed to be height and fighter. the replacement for the f-15. it is a real high performance fighter. it is meant to win against any potential adversary in dogfights. to have fewer f-22 and then you would have more of the f-35. , forwould be the mainstay the next 40 or 50 years. if you are fighting against a sophisticated adversary, the f- 22 are going in and they are fighting in the air against the adversaries of combat aircraft. the f-35 comes then and there are carrying the bombs that will take out the other military targets. they are the second wave that come in with -- to do the real heavy lifting. these are planes that are supposed to be all purpose. the f-35 is supposed to be able to provide support to combat troops on the ground if they're fighting and some
. the pace of technology change and spread of advanced military technology to state and nonstate actors pose an encreasing challenge to america's military. this is the environment that is facing the department of defense as it enters a third year of flat or declining budgets. the onset of these constraints has led to belt tightening in military modernization, force structure, personnel costs and overhead expenditures. it has given us the opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates. secretary gates curtailed more than 30 modernization programs and trimmed overhead costs within the military services and across the defense enterprise. the realignment continued secretary panetta who crafted new strategic guidance in an f.y. 2013 defense budget plan which reduced the department's top line by $487 billion over the course of a decade. the president's request of $526.6 billion for fy 2014 continues to implement the president's defense strategic guidance and enhances the departm
personnel along our borders as well as utilization of proven surveillance technology along the highest traffic areas across the southwest border. reducing wait times at the ports of entry the budget requests 35rks00 port officers. to scurel maritime borders the budget invests in coast guard assets, including the seven national security cutter and fast response cutters. the bum continues the department's focus on smart enforcement of our country's immigration laws. it supports the administration's effort to focus the enforcement system on safety threats and the integrity of the immigration system through childhood arrivals and greater use of rosecutor yull discretion. we support more cost effective initiatives of secure communities. e budget invests in monitory compliance to work sight related laws. while continuing to support alternatives to the tension, detention reform and immigrant immigration efforts. comprehensive immigration reform will help us build on these efforts and strengthen boarder security by enabling d.h.s. while focusing on criminals, human smallingers and those who im
of technology, students don't necessarily need teachers or information because they can go to the internet. what they do need teachers for is what information is relevant or accurate and how i use that information. >> four things that can make or break our educational system are -- creativity, relevance, technology, and teachers. without these, the educational system is worth less. >> people are not bombing the houses in this economy and taxes are not coming in -- people are not owning the house is in this economy and taxes are not coming in. they end up cutting things that we think are extras like the arts and physical education and they resource teachers that may be essential to being successful. >> and for some kids, education resource teachers are all they have. >> balick to read and write. >> -- i like to read and write. >> mr. president, if you cut our funds, i will not be able to learn properly and my teacher will be in jeopardy. president, every day, there are millions of kids struggling. i need help, mr. president. >> mr. president, i need your help, mr. president, i need your help. >>
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
believe they will have all the resources and technology and tools that they need to get to the bottom of it. thank you, everybody. >> senator john mccain says the boston marathon bombing should have no affect on the passing of the immigration bill. senator charles schumer, who said the goal was to pass this by late may or early june. this is 15 minutes. >> well, we had a very good meeting with the president. we briefed him on the details of our immigration reform bill. and while he certainly might not agree with every single part of it, he was very supportive of the bill we had put together. and simply wants to make sure we keep moving it along and get something done. i think everyone realizes, john realizes, i realize, the others in our group of eight and the president realizes, no one is going to get everything they want in a bill. but if we meet in the middle, can do a lot of good for and for our economy. and so we're feeling very good about this. things are moving in a very, very good way. and the president's support of our proposal, even though he wouldn't fully agree with it, it
to our critical infrastructure. >> how do you work to prevent this? >> we have technology, cyber technologies, prevention technologies. we spend a lot of time now on technologies.
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
of environmental degradation. wh fnetic pace of technolocal change and the spread of advanced military technology to state and non- state actors pose an increasing challenge to america's military. this is the strategic environment facing the department of defense as it enters a third year of flat or declining budgets. the onset of these resource constraints has already led to significant and ongoing belt- tightening in military modernization, force structure, personnel costs, and overhead expenditures. it has also given us an opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates, who canceled or curtailed more than 30 modernization programs and trimmed overhead within the military services and across the defense enterprise. these efforts reduced the department's topline by $78 billion over a five year period, as detailed in the department's fy 2012 budget plan. the realignment continued under secretary panetta, who worked closely with the president and the joint chiefs of staff to cra
Search Results 0 to 11 of about 12 (some duplicates have been removed)

Terms of Use (10 Mar 2001)